Tulsa Cyber Summit - College of Engineering & Computer Science

Virtual Tulsa Cyber Summit

Virtual Tulsa Cyber Summit
March 15 – 16, 2021

This year’s virtual Tulsa Cyber Summit lineup consists of innovative cybersecurity keynote speakers, formative leadership sessions and informative technology tracks. Please note that this conference will take place entirely online.

Have questions? Email us at cybersummit@utulsa.edu.

Featured Speakers

Admiral Michael S. Rogers, former Director, NSA & Operating Partner, Team8

Admiral Mike Rogers headshot

Mike Rogers retired from the U.S. Navy in June 2018 after 37 years of naval service rising to the rank of four-star admiral. He culminated his career with a four-year tour as Commander, U.S. Cyber Command and Director, National Security Agency. Admiral Rogers is a graduate of Auburn University and also holds a Masters of Science in National Security. He is a distinguished graduate of the National War College and a graduate of highest distinction from the Naval War College. He is an MIT Seminar XXI fellow and a Harvard Senior Executive in National Security alum.

During his service in uniform, ADM Rogers held positions afloat and ashore around the globe focusing on cyber, intelligence, maritime operations and national security. His joint service was extensive including duty with the Chairman of the Joint Chiefs of Staff, the Joint Chiefs of Staff and U.S. Indo Pacific Command. Admiral Rogers commanded at the unit, Fleet and service component levels in the Navy.

He is currently supporting various companies in the private sector, speaking to business groups and working internationally in the cyber and national security arenas.

Bruce Schneier, Internationally renowned security technologist 

Bruce Schneier headshotBruce Schneier is an internationally renowned security technologist, called a “security guru” by The Economist. He is the author of over one dozen books–including his latest, We Have Root–as well as hundreds of articles, essays, and academic papers. His influential newsletter “Crypto-Gram” and his blog “Schneier on Security” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.

Erin Kenneally, Director of Cyber Risk Strategy, Guidewire Software

Erin Kenneally HeadshotErin Kenneally is currently Director of Cyber Risk Strategy at Guidewire Software. She recently transitioned from serving as Portfolio Manager in the Cyber Security Division for the U.S. Department of Homeland Security, Science & Technology Directorate. She directed nearly 20 projects across programs in cybersecurity research infrastructure, privacy, cyber risk economics, and technology ethics. Kenneally is CEO and Founder of Elchemy, Inc., and previously served as Technology-Law Specialist at the International Computer Science Institute (ICSI) and the Center for Internet Data Analysis (CAIDA) and Center for Evidence-based Security Research (CESR) at the UC San Diego. Erin is a licensed Attorney specializing in information technology law, including privacy technology, data protection, AI & autonomous systems ethics and legal risk, trusted data sharing & governance, technology policy, and emergent IT legal risks. She holds Juris Doctorate and Masters of Forensic Sciences degrees and is a graduate of Syracuse University and The George Washington University.

Derek Vadala, Co-Founder & CEO, VisibleRisk

Derek Vadala

Derek Vadala is the CEO of VisibleRisk, a joint venture between Moody’s Corporation, a global integrated risk assessment firm, and Team8, a cybersecurity-focused company creation platform. Derek leads a team that is focused on creating a standard benchmark for communicating cyber risk to Boards of Directors and senior business executives in order to improve the global dialog about this important issue.

Prior to leading this venture, Mr. Vadala was the Global Head of Cyber Risk for Moody’s Investors Service, responsible for developing capabilities for evaluating cyber risk and incorporating those capabilities into credit analysis. Prior to this role, Mr. Vadala served as the Chief Information Security Officer for Moody’s Corporation from 2013-2018, where he was responsible for global information risk and security across Moody’s businesses worldwide. He has over 20 years of experience in information security and technology management and has spoken and published on topics including security risk management for large enterprises and systems administration.

Event Schedule

Monday, March 15

*Schedule is subject to change.
9 a.m.10 a.m.Keynote
A conversation with Bruce Schneier and Dr. Tyler Moore
10 a.m.11 a.m.Leadership Track: Cybersecurity Culture
Heidi Shadid, Attorney at Eller & Detrich P.C.
John Lister, GPSG
Safi Mojidi, Mindpoint Group
Technology Track: Privacy
Andrea Little Limbago, Interos
Timothy Fawcett, Guernsey
Tyler Moore, The University of Tulsa
11 a.m.11:15 a.m.Expo Hall Break
11:15 a.m.12:15 p.m.Leadership Track: Cyber Workforce Development
Randy Roberts
Bradley Brummel, The University of Tulsa
Bonnie Stith, Sepio Systems
Technology Track: Application Security
Luke Crouch, Mozilla
Kris Wall, Stinnett & Associates
12:15 p.m.12:30 p.m.Expo Hall Break
12:30 p.m.1 p.m.Lunch Break
1 p.m.1:30 p.m.Featured Speaker Erin Kenneally, Director of Cyber Risk Strategy, Guidewire
Ransomware- A Darwinian Opportunity for Cyber Insurance
1:30 p.m.2:30 p.m.Leadership Track: Enterprise Risk
Renee Wynn, former CIO of NASA
Vince Scott, Sentir
Gary Lorenz, Cyber Risk Executive
Technology Track: Your Digital Footprint
Lance Watson, Avansic
Jon Clemenson, TokenEx
Crystal Lister, GSPG
2:302:45 p.m.Expo Hall Break
2:45 p.m.3:30 p.m.Panel: Gender and Diversity in the Cybersecurity Workforce
Moderator: Vidhyashree Nagaraju
Andrea Little Limbago
Bonnie Stith
MSgt Mike Feggans
Camille Singleton
3:30 p.m.4:15 p.m.Phillips 66 Networking Reception

Tuesday, March 16

9 a.m.10 a.m.Keynote
A Conversation with Admiral Michael Rogers and John Rogers, CISO at MSCI
10 a.m.11 a.m.Leadership Panel: Advancements in Cyber Innovation
Moderator: Jennifer Hankins
Gina Hitz
John Pyrovolakis
Sean Alexander
Technology Track: Vulnerability Management
Scott Williamson, TRUE Digital
Tripp Hardy, Reprivata
Johnny Shaieb, IBM
11 a.m.11:15 a.m.Expo Hall Break
11:15 a.m.12:15 p.m.Leadership Track: Cybersecurity Education
Don Pipkin, TTC
Tyler Moore, The University of Tulsa
Ken Dewey, Rose State College
Technology Track: IoT Security
Hannah Robbins, IBM
Matt Hale, University of Nebraska
Mauricio Papa, The University of Tulsa
12:15 p.m.12:30 p.m.Expo Hall Break
12:30 p.m.1 p.m.Lunch Break
1 p.m.1:30 p.m.Featured Speaker
Derek Vadala, Cyber Assessments
Measuring and Communicating About Cyber Risk
1:30 p.m.2:30 p.m.Leadership Track: Healthcare Information Security and Privacy
Joe Walker, MyHealth
Dr. Nick Davis, Verinovum
Master Sergeant (MSgt) Mike Feggans, Vance AFB Clinic
Technology Track: Cybersecurity Operations
Camille Singleton, IBM
Vince Scott, Sentir
2:30 p.m.2:45 p.m.Expo Hall Break
2:45 p.m.3:30 p.m.Panel: Cybersecurity Challenges for the Small and Medium Enterprise
Moderator: Johnny Shaieb
Jerald Dawkins
Heidi Shadid
Timothy Fawcett
Jeremy Price
3:30 p.m.4:15 p.m.TU-Team8 Cyber Fellows Information Session

*Speakers and panelists are subject to change.

  • Leadership Track Session Descriptions

    Cybersecurity Culture

    What is it that drives success in cyber security for the organization? It can be summarized in one word: Culture. Culture sets goals and aspirations rooted in organizational ethos and binds them to practice and habit. This session discusses the ways in which a healthy culture can be cultivated and nurtured within a digital enterprise to combat cyber risk.

    Cyber Workforce Development

    The unvarnished truth in the world of cyber security is that, while technology abounds, skilled practitioners are in short supply. And while cybersecurity talent is hard to come by, it is even more difficult to develop. This session presents issues that impact cyber security workforce development from an organizational perspective.

    Enterprise Risk

    Risk is something we live with every day. Even when robust controls are in place, an organization or individual is confronted with residual risk. This session describes various aspects of cyber security risk to the enterprise and discusses some strategies for its management and mitigation.

    Leadership Panel: Advancements in Cyber Innovation

    Any inventor will tell you that the idea is the easy part. Its transformation into a real-world practical solution places the innovator on a path fraught with challenges and pitfalls. This panel opens a conversation on cyber innovation and describes novel programs and efforts to foster it within organizations and communities.

    Cybersecurity Education

    Education in cybersecurity is not a “one-size fits all” situation. End users and system operators need some cyber security literacy and awareness, security practitioners need specialized skills and training, while management and C-level employees might require an educational background that lets them connect the dots. This session provides a valuable perspective from educational leaders on the spectrum of cybersecurity educational offerings both regional and nationwide.


    Healthcare Information Security and Privacy

    There is no other category of information that is more personal and intimate in nature than our medical records. As digital healthcare data and information systems mushroom in scope and use, their security and our privacy are at stake. This session highlights the emerging hazards and solutions on this particular battlefront in cyber space.

  • Technology Track Session Descriptions


    Judge Louis Brandeis succinctly characterized privacy as “the right to be left alone.” Its entangled relationship with cybersecurity is underscored with each headline that documents the latest data breach. This session will expose the audience to that intersection with a focus on relevant technology issues and trends.


    Application Security

    Applications and software are tempting targets for the cyber adversary. Malicious code and attacks on digital logic can expose the keys to the kingdom, leaving a company or organization completely at the mercy of a threat actor. This session presents tools and techniques for improving the state of affairs for the enterprise concerning the security of applications and system software they develop, field, operate and manage.


    Your Digital Footprint

    When it comes to the value proposition relating risk management and the size of your organization’s digital footprint, less is more. Balancing mission support and cyber security in this regard can be a high-wire act. This session puts the spotlight on this endeavor and exposes the role of technology in supporting its pursuit.


    Vulnerability Management

    Vulnerability management has become a micro-industry within cyber security. Indeed, a robust cybersecurity posture calls for a mature approach to managing vulnerabilities with a strategic application of threat intelligence to security control deployment. This session is intended to offer a technological backdrop to the area, helping the audience navigate the confusing maze of terminology and solutions.


    IoT Security

    The Internet of Things has transformed the everyday appliance into a threat vector. Toasters, kiosks and automobiles collect data, have Internet addresses, and run software susceptible to attack. This session offers a look at some of the threats and on-going work to address them in this new wild west of cyber space.


    Cybersecurity Operations

    A constellation of technologies supports cyber security operations. Some are front and center while others operate behind the scenes. This session explores selected technologies fundamental to this aspect of an organization’s cybersecurity presence. A special element of the session is that it considers cybersecurity operations for both IT and OT.

  • Panel Descriptions

    Leadership Panel: Advancements in Cyber Innovation

    Any inventor will tell you that the idea is the easy part. Its transformation into a real-world practical solution places the innovator on a path fraught with challenges and pitfalls. This panel opens a conversation on cyber innovation and describes novel programs and efforts to foster it within organizations and communities.


    Panel: Gender and Diversity in the Cybersecurity Workforce

    Establishing and raising the standard for inclusiveness in gender and diversity for the cybersecurity workforce is of paramount importance for the growth of the field and for the health of organizations. But obstacles remain and progress is hard-won. This panel brings to bear the experience of professionals on this topic and presents their insights on how to overcome systemic obstacles and create wins for organizations on this front.


    Panel: Cybersecurity Challenges for the Small and Medium Enterprise

    Not every organization is blessed with the resources a Fortune 500 company can allocate towards the defense of their digital assets. Threat actors now recognize the asymmetry at play: while small to medium enterprises are relatively limited in their ability to build out gold standard security infrastructures and operations, they nevertheless must protect sensitive data and high value assets. Moreover, they often provide an avenue for adversaries targeting bigger game. Panelists in this session will discuss the special challenges small and medium enterprises face in cybersecurity and offer some wisdom on how to cope with them.